
Prestige 662H/HW Series User’s Guide
14
Chapter 17
Anti-Virus Packet Scan ........................................................................................ 204
17.1 Overview ........................................................................................................204
17.1.1 Types of Computer Viruses ..................................................................204
17.2 Signature-Based Virus Scan ..........................................................................204
17.2.1 Computer Virus Infection and Prevention .............................................205
17.3 Introduction to the Prestige Anti-virus Packet Scan .......................................205
17.3.1 How the Prestige Virus Scan Works ....................................................206
17.3.2 Limitations of the Prestige Packet Scan ...............................................206
17.4 Anti-virus Packet Scan Configuration .............................................................207
17.5 Registration and Online Update .....................................................................208
17.5.1 Updating the Anti Virus Packet Scan ....................................................210
Chapter 18
Introduction to IPSec ........................................................................................... 212
18.1 VPN Overview ................................................................................................212
18.1.1 IPSec ....................................................................................................212
18.1.2 Security Association .............................................................................212
18.1.3 Other Terminology ................................................................................212
18.1.3.1 Encryption ...................................................................................212
18.1.3.2 Data Confidentiality .....................................................................213
18.1.3.3 Data Integrity ...............................................................................213
18.1.3.4 Data Origin Authentication ..........................................................213
18.1.4 VPN Applications ..................................................................................213
18.2 IPSec Architecture .........................................................................................213
18.2.1 IPSec Algorithms ..................................................................................214
18.2.2 Key Management ..................................................................................214
18.3 Encapsulation .................................................................................................214
18.3.1 Transport Mode ....................................................................................215
18.3.2 Tunnel Mode ........................................................................................215
18.4 IPSec and NAT ...............................................................................................215
Chapter 19
VPN Screens......................................................................................................... 218
19.1 VPN/IPSec Overview .....................................................................................218
19.2 IPSec Algorithms ............................................................................................218
19.2.1 AH (Authentication Header) Protocol ...................................................218
19.2.2 ESP (Encapsulating Security Payload) Protocol .................................218
19.3 My IP Address ................................................................................................219
19.4 Secure Gateway Address ..............................................................................220
19.4.1 Dynamic Secure Gateway Address ......................................................220
19.5 VPN Summary Screen ...................................................................................220
19.6 Keep Alive ......................................................................................................222
Comentarios a estos manuales